Security

Finding a website host: how to search successfully

Host: how to find out which provider is most suitable for your project

If you want to release a new web project today, you need to find the right host. Hosts have become a popular alternative for large companies, since they enable convenient outsourcing of certain work areas or data, saving company resources. But how do you know which host and which hosting package best meets your needs? And why is the provider’s security concept such a crucial criterion nowadays?

Windows 7: End of Life

Windows 7 end of support: What you need to do?

Even years after it was first released, Windows 7 continues to be one of the favourite operating systems worldwide. But with Microsoft announcing the end of its support for Windows 7, many PC users will need to upgrade or look for an alternative. But just because Windows 7 has reached the end of its life, doesn’t mean the software is no longer working. Windows 7 EOL means that Microsoft will no...

Intrusion detection systems and prevention systems

The intrusion detection and intrusion prevention systems at a glance

A stable network is characterised not only by the appropriate hardware structures, but also by a watertight security concept. In addition to back-up solutions and intelligent fail-safe systems, protection against external access attempts is a must. Intrusion detection systems (IDS) and intrusion protection systems (IPS) are an excellent addition to the classic firewall and are therefore a sensible...

Turn on Windows Defender

Turn on Windows Defender for basic protection

Windows Defender is Microsoft’s free antivirus software that allows users to protect their PC from harmful programs and cyberattacks. Defender now comes preinstalled on most Windows machines. In the past, it has attracted criticism, but with the roll-out of Windows 10, it provides good baseline protection. Turning on Windows Defender enables you to use a range of modern antivirus features to...

What is an SPF record?

Understanding and using SPF records

How can the recipient of an email tell whether a message is actually coming from the person who appears to be sending it? Many scammers attempt to forge the email sender address. But you can protect yourself. You can verify the outbound mail server using the SPF (Sender Policy Framework), a popular authentication method. How does SPF work and what can it do?

UDP flood

UDP flood

UDP flood attacks have been used in the past for denial-of-service attacks. Even servers for major organisations have collapsed under the massive amounts of data. We’ll explain how a UDP flood attack works and provide you with an overview of its technical background, proven security measures, and how it is different from other DoS attacks.

S/MIME: the standard method for e-mail encryption

S/MIME: how to encrypt and sign your e-mails

If you send an e-mail without additional security measures, it’s like sending a postcard: if everything goes as planned, the information should arrive unchanged and unread in the recipient’s inbox. However, if someone intercepts the card or the e-mail in transit, they can read the contents without any problem and make as many changes as possible. Just like you would use an opaque envelope to...

TOTP

Time-based one-time password: TOTP explained

Data leaks and hacker attacks mean that internet security is becoming increasingly important for users. Standard passwords based on names and dates of birth can be cracked in seconds and give criminals access to all kinds of accounts. In combination with multi-factor authentication, TOTP can provide a solution: a password which is only valid for a short time. How does this work?

What is a one-time password (OTP)?

One-time password (OTP) – more security online

Whenever you go online, you constantly have to use passwords, whether for online banking, online shopping, or logging into a company network. Unfortunately, these passwords aren’t always as secure as they should be. Using a one-time password (OTP) is one way to better protect yourself. In this article, you’ll find out what a one-time password is and why you might want to use one.

ARP Spoofing: Attacks from the internal network

ARP Spoofing – flaws in network security

When it comes to network security, administrators focus primarily on attacks from the internet. But often times, the danger lurks in the internal network. If the LAN turns out to be a blind spot in the security IT, then internal attackers have an easy time. A popular method of attack is ARP spoofing. With this, hackers switch undetected between two communication partners in order to intercept,...


Wait! We’ve got something for you!
Get your .co.uk domain for just £1/1st year.

Enter the web address of your choice in the search bar to check its availability.
12 months for £1
then £10/year